Lecture on copyright - what is protected, what rights you have as artists, what is infringement, fair use / fair dealing, sharing with creative commons licenses - presented to Visual Arts students at Lasalle School of the Arts, Singapore
Copyright for Artists - including Creative CommonsBenjamin Ang
A quick guide to Copyright Law (based on the Copyright Act, Singapore) and the rights that Artists (visual artists) have under the Act. Covers Exclusive Rights, What is an Artistic Work, Fair Dealing, Creative Commons and Public Domain. The author is a lecturer in Intellectual Property and Media Law, Copyright lawyer, and former in house counsel for a comic book company
Copyright for educators and students [autosaved]readlistendream
This presentation is a look at Copyright in Education. It is not meant as a legal source, but only as a general guideline to using Copyrighted works in educational multimedia. Please use with caution and use common sense when using any copyrighted work.
Copyright for Artists - including Creative CommonsBenjamin Ang
A quick guide to Copyright Law (based on the Copyright Act, Singapore) and the rights that Artists (visual artists) have under the Act. Covers Exclusive Rights, What is an Artistic Work, Fair Dealing, Creative Commons and Public Domain. The author is a lecturer in Intellectual Property and Media Law, Copyright lawyer, and former in house counsel for a comic book company
Copyright for educators and students [autosaved]readlistendream
This presentation is a look at Copyright in Education. It is not meant as a legal source, but only as a general guideline to using Copyrighted works in educational multimedia. Please use with caution and use common sense when using any copyrighted work.
This PowerPoint slide is about copyright and creative commons. A simple but understanding slide for students to know what the basic differences are and how to use them under certain conditions to ensure that they do not infringe the legal rights.
Marketing Director Mark Miller discusses the use of copyrighted material and what you should and shouldn't do when creating content. Answering questions along the way, Mark discusses your rights, other's work, orphaned works, and what falls into the public domain.
This PowerPoint slide is about copyright and creative commons. A simple but understanding slide for students to know what the basic differences are and how to use them under certain conditions to ensure that they do not infringe the legal rights.
Marketing Director Mark Miller discusses the use of copyrighted material and what you should and shouldn't do when creating content. Answering questions along the way, Mark discusses your rights, other's work, orphaned works, and what falls into the public domain.
5 steps to prevent project group meltdownBenjamin Ang
Students and educators alike know that project groups (including problem based learning or PBL) can be a dream or a nightmare depending on how you run them, so here are 5 tips (from experience working with both types of student groups) on how to make your project work
How open is the Internet in Singapore? This presentation looks at different factors of openness and lists the relevant regulations and common law principles involved
Election Blogging and Social Media 2015Benjamin Ang
Talk by Benjamin Ang, Education Chair (2015) of the Internet Society Singapore Chapter, on the legal issues around blogging and social media during the General Elections 2015 in Singapore, especially on Cooling Off Day (Polling Day Eve). Topics included laws and legislation such as the Parliamentary Elections Act, Internet Advertising Rules, Sedition Act and MDA Class Licensing. Presented at the workshop on Election Blogging and Social Media, organized by the Internet Society Singapore Chapter.
Intellectual property in music (Copyright and Creative Commons)Benjamin Ang
This was a talk given on invitation of the Intellectual Property Office of Singapore (www.ipos.gov.sg) explaining what rights musicians have to protect their music, and how these rights can be assigned or licensed to other creators
Content, Copyright and Creative Commons as one of my 2016-2017 lectures at th...Roberto Peretta
Content, Copyright and Creative Commons as one of my 2016-2017 lectures at the University of Bergamo. It's stimulus material, posted to improve communication with current students. It's not interesting for the academia.
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's National Cyber Security Strategy was launched by the Singapore government at the inaugural Singapore International Cyber Week 2016. This presentation gives an overview of the 4 pillars of the Strategy and some of its implementation steps so far, including the upcoming new Cybersecurity Act, and the SGD 10 million fund for capacity building in ASEAN. You can download the full Strategy at www.csa.gov.sg
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
These slides summarize the activities of the Internet Society Singapore from 2015 to 2016, and were presented at the Annual General Meeting on 24 August 2016
3 types of legal technology that work (2016)Benjamin Ang
Lecture presented for Temasek Polytechnic Diploma in Law and Management - Subject: Management of Law Office and Court Technology - Topic: Legal Technology
Presented by Ms Goh Tsu Lynn, Senior Manager, Workforce Singapore (WSQ) at NUS-ISS Briefing Session for Employers on Professional Conversion Programme on 9 Dec 2016.
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
After the case of Apple v FBI was not resolved in court, question of security vs privacy in the cybersecurity field still remain. Is encryption good or bad or is there a better way to balance the interests of law enforcement, business, end users and regulators? This presentation gives special emphasis to Singapore law.
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
This is my talk on Legal and Cybersecurity issues of Disclosure on the Internet. The Internet Society was invited to co-host this event "Unraveling the Panama Papers (and Bahamas Leaks) - Secrecy for Sale" organized by REAL Analytics Pte Ltd.
Election Blogging and Free Speech (Internet Society Singapore)Benjamin Ang
Talk by Mr Jack Lee, Associate Professor, Singapore Management University, on Election Blogging and the Free Speech framework in Singapore Law. Topics covered: General Election 2015 Singapore, Constitution of Singapore, Defamation Law. Presented at the workshop on Election Blogging and Social Media, organized by the internet Society Singapore Chapter, August 2015, panel discussion co-moderated by Prof Ang Peng Hwa (NTU) and me (Benjamin Ang).
Reference source is "A HAND BOOK OF COPYRIGHT LAW"
There is an acute lack of awareness on various issues relating to copyright and related rights amongst stakeholders, enforcement agencies, professional users like the scientific and academic communities and members of the public. The questions put forth by the representatives of these sections of society vary from those relating to the very fundamentals of intellectual property rights to those which relate to practical applications.
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
Lecture on cybersecurity in ASEAN and Singapore
- Definitions of cybersecurity in ASEAN (vs western definitions)
- Cyber threat landscape in ASEAN / types of cyber incidents and cyber crime in ASEAN
Why ASEAN is vulnerable
- Characteristics of ASEAN in cyberspace
non-interference, sovereignty
non-attribution of cyber attackers
- ASEAN cooperation in cyberspace
AMCC (ASEAN Ministers Cyber Conference)
ACICE (ADMM Cyber Info Centre of Excellence)
INTERPOL
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
Session 4 - International Cooperation to Impose
Consequences on Malicious Cyber Activities
Many states are concerting joint efforts to impose costs for irresponsible behaviors in
cyberspace by sharing information, jointly disclosing attribution, or issuing joint statements with allies, partners, or like-minded states. Being aware of the importance of the roles played by private sectors for national cybersecurity, states are seeking ways to induce cooperation from private sectors as well.
Session 4 covers cooperation efforts at the international level for imposing consequences on irresponsible state behavior in cyberspace. Speakers are expected to address the following
points.
H. Introduce cases where costs for irresponsible state behavior in cyberspace are effectively
imposed with joint efforts among states.
I. Introduce cases where cooperation between private and public sectors has contributed to
impose costs for irresponsible state behavior in cyberspace.
J. Underscore specific areas where efforts for international cooperation need to be concerted
to effectively impose consequences for irresponsible state behavior in cyberspace.
[Panel]
Moderator: Caitriona Heinl (Azure Forum for Contemporary Security Strategy)
Speaker: James Lewis (Center for Strategic and International Studies)
Speaker: Benjamin Ang (Nanyang Technological University)
Speaker: Karsten Geier (Centre for Humanitarian Dialogue)
[12:00-13:30, KST (GMT+9)] Luncheon
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
CYBERSPACE: A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
Definition
Foreign interference occurs when a foreign entity (state or non-state actor),
with hostile intent,
takes actions to deliberately, covertly and deceptively
disrupt the politics and policies of the target state
Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published by Google TAG (Threat Analysis Group)
Overview
1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results.
2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war.
3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem that will likely have long term implications for both coordination between criminal groups and the scale of cybercrime worldwide.
Sources: Defending Ukraine: Early Lessons from the Cyber War (Microsoft)*
Defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries.
Recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks.
As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine.
In coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts.
This calls for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations.
The Strontium group was targeting Ukrainian institutions, media organizations, and government institutions and think tanks in the United States and the European Union
Microsoft got court orders 16 times to redirect internet traffic from Strontium domains into a ‘sinkhole’
How to defend the information domain
Public coverage and exposure
Clear counter-messages
Legislation
Build media and digital literacy
Work with citizens, influencers
Detect and expose fake accounts
Active measures
Work strategically, not reactively
Build a strong narrative that is more attractive than the adversary
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
3 areas of cooperation
Council for Security Cooperation in the Asia Pacific (CSCAP)
Track II Network of ASEAN Defence and Security Institutions (NADI)
UN OEWG Open-ended Working Group on security of and in the use of information and communications technologies
Council for Security Cooperation in the Asia Pacific (CSCAP)
non-governmental (second track) process for dialogue on security issues in the Asia Pacific
informal mechanism for scholars, officials and others in their private capacities
to discuss political and security issues and challenges facing the region
provides policy recommendations to inter-governmental bodies
convenes regional and international meetings
establishes linkages with institutions and organisations in other parts of the world
exchanges information, insights and experiences in the area of regional political-security cooperation.
Track II Network of ASEAN Defence and Security Institutions (NADI)
Secretariat is RSIS
Aims of the forum
network and to build confidence and familiarity among the Asean think tanks and research institutions to facilitate closer cooperation.
policy analysts specialising in defence and security issues, academics researching security cooperation and defence officials to discuss issues of security cooperation that the Asean Summit and Asean Defence Ministers have raised
participants to think beyond their governments’ positions and to provide timely fresh ideas and relevant recommendations for the Asean defence track to consider.
UN OEWG on Cyber
Open-ended Working Group on security of and in the use of information and communications technologies
The group is mandated to
further develop the rules, norms and principles of responsible behaviour of States;
consider initiatives of States aimed at ensuring security in the use of information and communications technologies;
establish, under the auspices of the United Nations, regular institutional dialogue with the broad participation of States;
continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security, inter alia, data security, and possible cooperative measures to prevent and counter such threats, and how international law applies to the use of information and communications technologies by States,
as well as confidence-building measures and capacity-building.
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
What is technology disruption?
A new technology that changes
The way things are done
Expectations and behaviors
Market or industry
Uber/Grab vs taxi business
Airbnb vs hotel business
Netflix vs TV, DVD, cinemas
Blockchain vs financial institutions
Google vs books, libraries
ChatGPT vs Google
How can technology disrupt the Law?
DoNotPay
https://donotpay.com/
Bizibot
https://www.btlnet.co.uk/digital-transformation-solutions-overview/bizibot
WeVorce
https://www.wevorce.com
OCBC Online Will Generator
https://www.ocbc.com/personal-banking/lifegoals/willgenerator/#/
Transcripts
https://fortherecord.com/transcript-express/
Law firms using Blockchain
https://www.raconteur.net/technology/blockchain/blockchain-revolutionising-legal-sector/
LawGeex AI vs human lawyers, on reviewing standard contracts
Accuracy
Time taken to review contract
Courts used technology to deliver justice during COVID
But litigants with resources had the advantage
https://www.pewtrusts.org/en/research-and-analysis/reports/2021/12/how-courts-embraced-technology-met-the-pandemic-challenge-and-revolutionized-their-operations
Disruption has no ethics. But we do.
Must bridge the Digital Divide
Parties may need help
https://www.ncsc.org/__data/assets/pdf_file/0026/53738/PPP-Technology-Digital-Divide-Considerations.pdf
Using AI for judgments
Benefits
Exclude legally irrelevant factors
Standardise decisions
Help courts to prioritise cases, increase efficiency
Encourage parties to settle if success is predicted to be unlikely
https://www.cppr.in/articles/predictive-justice-using-ai-for-justice-introduction
Risks
Over reliance on machine decisions
Algorithmic bias: bad history = bad future
Bad data feedback into bad data
Inability to explain decisions: bad for rule of law
https://www.suls.org.au/citations-blog/2020/9/25/predictive-judicial-analytics-implications-for-rule-of-law-and-the-legal-profession
Cases of AI bias in justice system
COMPAS (for probation)
Black defendants were 2x wrongly predicted to be high risk of recidivism
White defendants were 2x wrongly predicted to be low risk of recidivism
Black defendants were 2x more likely to be misclassified as high risk of violent recidivism
White violent recidivists were 63% more likely to have been misclassified as low risk
https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm
Public Safety Assessment (for bail)
More likely to recommend high bail for males than females
https://venturebeat.com/ai/study-finds-crime-predicting-judicial-tool-exhibits-gender-bias/
How does this type of AI work?
How does this type of AI work?
Where did the ML (Machine Learning) come from?
Garbage In = Garbage Out
Always check what’s going in and what’s coming out
Rand Report on Protecting Individuals using tech in the Justice
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
There is no international definition of these concepts in cyberspace
Armed attack
Use of force
Act of war
Traditional definitions require physical damage or physical injury
Rules of Law of Armed Conflict / International Humanitarian Law(but in cyber?)
Distinction – must distinguish between civilians and military targets
Proportionality – must avoid excessive harm to civilians / objects
Military necessity – allows force that is reasonable, lawful (see above), and operationally justified
Limitation – prohibits tactics that cause unnecessary suffering
Humane treatment – e.g., of captured prisoners
Do we need a Binding Legal Instrument?
US - No new international legal instrument needed, can interpret existing law
China - States must reach international consensus, new international legal instruments
EU - No new international legal instrument needed, can interpret existing law
ASEAN chooses its own terms on norms/law
ASEAN supported both UNGGE and OEWG tracks in 2018 – Indonesia, Singapore, and the Philippines said both processes were not incompatible
ASEAN has always followed its instinct of creating an internationally agreed, rules-based order based on its own interests, which is consistent with other arenas where international law or rules are unsettled
ASEAN may even consider plurilateral treaties
What ASEAN states need to move forward
Common language related to cyberspace
Legislation that can be translated across members
Capacity building in
Cyber issues, policy making, critical infrastructure protection (ASCCE) and
Military operations (ADMM Cyber and Information COE)
Confidence building measures e.g., CERT-CERT communications, contact lists
More participation from states, academia, and civil society
What is Cybersecurity – C, I, A?
Cybersecurity or Information Security?
Activities of foreign political, economic, military, intelligence, and information entities
The striving of countries toward dominance in the world information space
Development (by states) of information war concepts that create means for dangerous attack on the information spheres of other countries
Infringing the state’s control over information flows and public opinion (called “cyber sovereignty”)
ASEAN leaders
Value the principles of “mutual respect” and “non-interference”
View sovereignty as sacrosanct principle among ASEAN member states
Do not define ‘sovereignty’ – this provides flexibility in foreign and domestic policy
ASEAN member states also attach great importance to the creation of an international rules-based order,
which includes forming and adhering to international law and norms.
like the UN Convention of the Law of the Sea or UNCLOS.
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
Capacity building is recognized as a key to promote the adoption and implementation of international norms of responsible state behaviour in cyberspace. States at varying levels of cyber maturity benefit from these efforts, to develop a shared understanding of how international cyber norms support the stability of cyberspace, and to grow their own capacity and capabilities to implement these norms. This presentation draws on the experiences of the academics and practitioners who have been conducting cyber capacity building activities in southeast Asia and beyond, to derive lessons of what has (or has not) worked, some potential best practices, and to provide suggestions on how cyber capacity building can provide more value to the further growth of international cyber norms in the world.
UNGGE 2015 Cyber Norms
UN Open Ended Working Group (UN OEWG)
UN Singapore Cyber Programme (UNSCP)
Norms Implementation Checklist
RAP Matrix
ASEAN Ministers Cyber Conference (AMCC)
Capacity building
Confidence Building Measures (CBMs)
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
Two mistaken views of Cybersecurity and Geopolitical Risk:
1. “It doesn’t affect me because I’m not a government entity or major target”
2. “There’s nothing I can do about it anyway”
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
Slides from a talk given to Eunoia Junior College, Singapore
-------------------
Cyber Warfare questions
Are the concerns about cyber warfare overblown?
Why should young people care about cyber warfare?
What are the national/international systems or structures currently in place to protect us from cyber warfare? Are these protections adequate?
Considering that Singapore is a small country, is there really anything we can do in the face of the challenges posed by cyber warfare?
-------------------
Cybercrime Questions
How do scammers make Singaporeans lower their guard despite them already knowing that scams are prevalent in our society? Why do you think people still fall for scams?
By the time new types of scams are reported, new types of scams are already being created. How do you think the Singapore government can break this cycle?
How hard is it to find out criminals behind cyber attacks?
-----------
Information Operations questions
The Russo-Ukraine War, what are your thoughts on it being publicized on social media unlike many wars from the past?
Are there any political implications regarding the publication of the war on TikTok? Could posting the war on TikTok create any social issues?
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
Case studies of disinformation and misinformation from Southeast Asia including Asian examples of Pro-Russia Anti-Ukraine narratives at the start of the Russian invasion of the Ukraine. Presented at the Conference on Disinformation and Cybersecurity of the War Studies University, Warsaw Poland, in 2022. Refers to the RSIS Framework on Information, Influence and Interference, from the Centre of Excellence for National Security at the S Rajaratnam School of International Studies (RSIS) at Nanyang Technological University (NTU) Singapore
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
[ To read and download the Policy Report that this presentation is based on, see https://www.rsis.edu.sg/rsis-publication/cens/cases-of-foreign-interference-in-asia/ ]
The Public and International Law Committee of the Law Society of Singapore invites you to join us for the Public Law Conference 2021 which aims to promote interest in the administrative and constitutional law of Singapore, highlight new judicial decisions, and facilitate discussion of recent developments.
To be held online on 15 September, we are pleased to have the Minister for Home Affairs and Law, Mr K Shanmugam, deliver a keynote speech on the public law issues relating to online harms and foreign interference. These issues are important and topical as they have a significant impact on society today, not just in Singapore, but worldwide. This will be followed by a panel that will analyse and develop the themes raised in the keynote, as well as discuss possible solutions, including legislative solutions, to such issues, in the context of public law. The panellists will comprise the Honourable Minister himself, practitioners, legal officers and academics active in the fields of administrative and constitutional law.
This conference provides a platform to hear from legal experts, and for different sectors of the legal industry to share ideas. We hope it will be relevant to all legal practitioners, government decision-makers, public-sector policy makers, academics and law students interested in public law.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Infographic of the flow of Contract Law
Formation of Valid Contract
Offer, Acceptance, Consideration, Intention
Vitiating Factors which make a contract not valid
Misrepresentation, Mistake, Minor
Terms of Contract
Promises, Representations vs Warranties
Express vs Implied Terms
Discharge of Contract
Discharge by Breach - Actual and Anticipatory
Discharge by Agreement, Frustration of Contract
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
This lecture covers the The Legal Technology Vision which is a five-year roadmap to help the legal industry in Singapore to leverage technology to enhance their practice. It is also a call to action for legal technology providers to engage in public-private collaboration for the building of a legal tech ecosystem. You can find it at https://www.sal.org.sg/Resources-Tools/Legal-Technology-Vision
You can follow Benjamin Ang on Twitter for updates and commentary on technology policy and legal issues at http://twitter.com/benjaminang
Thinking of a career as a paralegal, lawyer, prosecutor, in-house counsel, or even outside the legal industry, or starting your own business as an entrepreneur? You'll be surprised what Legal Technology could mean for your future.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
1. COPYRIGHT FOR ARTISTS
Benjamin Ang www.visual-lawschool.com
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
2. Outline
What is Copyright?
What are your rights?
How can we share or re-use?
Case Study
3. What is Copyright?
What are your rights?
How can we share or re-use?
Case Study
What is copyright?
4. What does copyright protect?
1. Novels
2. Computer programs
3. Sheet music
4. Paintings
5. All of the above
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
5. 5. All of the above
1. Novels – Literary Work
2. Computer programs – Literary Work
3. Sheet music – Musical Work
4. Paintings – Artistic Work
Also Scripts for plays – Dramatic Work
6. What copyright protects
“A degree of independent effort in the creation of
the work.”
NOT whether the work has creative merit.
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
7. Mary has an original idea
… does she have copyright?
My installation will
be 10 metres high
and made of
green noodles
8. No, she has no copyright yet
She has to put it in material form
9. Mary didn‟t register her artwork
… does she still have copyright?
Hey, you didn‟t
register!
10. Yes, registration is NOT necessary
But it could be useful to help prove
Mary was the original artist
11. Mary now has Exclusive Rights
to her work, in many countries
You all need
my permission
15. Artistic Works and Works of Artistic
Craftsmanship
Paintings
Drawings
Photographs
Regardless of artistic
value!
Must be artistic
Must have
craftsmanship
Artistic Works Artistic Craftsmanship
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
16. Authors Works that are protected
Type Example
Literary Written works / Books
Articles in journals or newspapers
Lyrics in songs
Source codes of computer programs
Dramatic Scripts for films & drama (as applied)
Choreographic scripts for shows or dance
Musical Melody
Artistic Paintings
Drawings
Photographs
Works of artistic craftsmanship, e.g. designer furniture that is not mass
produced
17. Copyright also protects Entrepreneurs
Recordings Publications
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
18. Entrepreneurial works that are
protected
Type Example
Published
editions
Typographic arrangements of a published work
Sound
recordings
sounds recorded on tapes, CDs, etc
Films visual images and sounds recorded on tapes,
video compact discs, digital versatile discs
TV and radio
Broadcasts
TV and radio Broadcasts
Cable
programmes
Programmes (visual images and sound) included in a cable
programme service sent by means of a telecommunication
System
Performances By performers such as musicians, singers and comedians
19. What is NOT protected by copyright
Ideas/
Concepts Discoveries Historical
Facts
Methods Procedures
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
20. What is Copyright?
What are your rights?
How can we share or re-use?
Case Study
What are your rights?
21. Can Billy make a 2D copy of Mary‟s
3D artwork?
Your sculpture is 3D,
my photo is 2D, it‟s
not the same!
22. The artist has exclusive right to make
2D versions of 3D works, and
3D versions of 2D works
Billy needs permission
23. Can Tom publish Mary‟s artwork?
I‟ll put it in a
book, which I‟m
giving away free
24. The artist has exclusive right to publish
the work
Tom needs permission
25. Rights in Classical Works
Type of Work Exclusive Rights that the Creator has
Literary, dramatic
and musical
works
•reproduce the work;
•publish the work;
•perform the work in public;
•communicate the work to the public; and
•make an adaptation of the work.
Artistic works •reproduce the work;
•publish the work; and
•communicate the work to the public
•Make 2D versions of 3D works
•Make 3D versions of 2D works
27. Can Terri make copies of Mary‟s
artwork to teach her class?
28. Terri may have Fair Use
But she must fit the criteria for
educational or research purposes
29. Can Billy use part of the artwork in a
documentary?
My documentary is
about artists like Mary
30. Billy may have Fair Use
Provided he is commenting or
reviewing the work
31. Fair Dealing Examples
Fair dealing = up to
10% of the number of
pages or 1 chapter,
whichever is the
greater
Fair dealing =
acknowledgment of
the work
“research or study” “criticism, review or reporting”
32. The 4 Factors of Fair Dealing
Purpose and character of the dealing (e.g.
commercial nature? non-profit? Educational?);
Nature of the work;
Amount and substantiality of the part copied taken
in relation to the whole work;
Effect of the dealing upon the potential market;
The possibility of obtaining the work within a
reasonable time at an ordinary commercial price.
36. What you can do with rights
Copyright is a form of property.
It can be licensed or transferred,
either as an entire bundle (all of the rights)
or as a single right (e.g. only the right to adapt)
Adaptation
38. How long these rights last
Type of Work Duration of Copyright
Literary, dramatic,
musical and artistic
works
70 years from the end of the year in which
the author died.
Specifically for photographs, or if the work
is published after the death of the author,
it lasts for 70 years, from the end of the
year in which the work was first published.
Published editions of
literary, dramatic,
musical or artistic
works (layout)
25 years from the end of the year in which
the edition was first published.
40. No consent = infringement
Consent is needed to do anything that only the
copyright owner has the exclusive right to do (e.g.
reproduce the work).
Merely acknowledging the source when one uses the
work is insufficient.
To obtain consent from copyright owners, one may:
contact the copyright owners directly and negotiate for a
licence to use the copyright work; or
obtain a licence through a collecting society.
No consent = infringement
41. Primary Infringement
Infringement occurs when one has not obtained
consent from the copyright owner to do something
that only the copyright owner has the exclusive right
to do.
E.G. photocopies an artwork without consent
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
43. Substantial Amount
You don‟t need to have reproduced the entire
copyright work -
As long as a SUBSTANTIAL AMOUNT of the original
work has been copied.
NOT just quantity copied
It‟s the NATURE of the portion
that was copied
If the portion copied is important part,
it may be a SUBSTANTIAL amount
Icon made by Freepik from www.flaticon.com is licensed under CC BY 3.0
44. Secondary Infringement
When one deals commercially with infringing
copies, e.g. if he
a) imports infringing copies for sale or distribution;
b) sells (including distribution for trade or any other
purpose)
or lets for hire infringing copies; or
c) offers infringing copies for sale or hire by way of
trade.
48. Permission from Copyright Owners
“Terms of Use …. You also grant other users and
members of the public a world-wide, royalty free, non-
revocable and non-exclusive licence to use, distribute,
reproduce, modify, adapt, publicly perform and
publicly display such Content for non-commercial
purposes. Non-commercial purposes include but are
not limited to academic presentations, private
research, study, criticism and review, any charitable
purpose and any purpose that is solely for public
benefit.” Source: Singapore.sg
http://app.singapore.sg/terms-of-use
49. Public Domain = no control
Intellectual property rights
have expired or are
inapplicable. E.g.
The plays of Shakespeare
The music of Beethoven
Most of the early silent
films
Formulae of Newtonian
physics
Sources
Wikimedia Commons
Pixelbay
50. How can Mary give her art to fans
free, but make commercial users pay?
Do I need a
lawyer to do
this?